<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.cytex.io/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.cytex.io/</loc>
		<lastmod>2025-10-27T23:01:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/08/Cytex-Core-red-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/08/dar_me.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/08/apsgloballlc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/08/intel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/08/nvidia_inception.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/marsh-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/sentricus-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/octopian-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/08/cybercfic_logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/nuari-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/texas-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/mit-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/08/cyvision.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/AICenturion-AI-Governance-Cycle-scaled-e1761605715627-1024x797.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/05/dashboard-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/cytex-walkthrough-video-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/05/Risk-repository.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/logo-image-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/logo-image-1024x445.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/compliance-map-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/aicenturion/</loc>
		<lastmod>2025-06-18T10:51:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/cropped-site-icon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/ai-security-header-3-1024x568.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/aicenturion-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/cytex/</loc>
		<lastmod>2025-08-15T10:18:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/10/image-stack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/nuari-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/octopian-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/okin-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/sentricus-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/social-impact-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/cfic-e1755073051406.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/texas-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/cloud-warriors-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/marsh-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/mit-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/cytex-walkthrough-video-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/05/dashboard-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/05/Risk-repository.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/logo-image-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/logo-image-1024x445.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/compliance-map-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/cybersecurity/</loc>
		<lastmod>2025-08-15T10:19:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/05/gif-41.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/11/tprm-hero1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/09/msp-sample-image-700.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/meeting2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/cytex-partner-program/</loc>
		<lastmod>2025-09-02T16:26:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/cropped-site-icon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/plugins/formidable/images/ajax_loader.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/cytex-data-sheet-cytex-features-matrix-1024x557.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/09/credit-card.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/terms-of-use/</loc>
		<lastmod>2025-12-16T20:47:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.cytex.io/for-msps/</loc>
		<lastmod>2025-12-18T12:24:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/cropped-site-icon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/05/dashboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/06/SaaS-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/06/SaaS-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/06/SaaS-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/06/cytex-data-sheet-cytex-features-matrix-1024x557.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/09/LEO-Gif-Landscape-.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/10/testimonial-heathcare-605x605.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/09/pie-chart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/09/credit-card.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/privacy-policy/</loc>
		<lastmod>2026-01-02T08:48:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.cytex.io/cloudsecurity/</loc>
		<lastmod>2026-01-06T09:45:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/The-Cytex-CSPM-Advantage-1024x726.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/cytex-cspm-advantage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/alert-triage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/threat-monitoring.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/incident-response.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/offensive-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/Continuous-multicloud-security-and-compliance.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-RFtk3W-e1765280443626.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-jN3jMq.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-zln68S.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/compliance_automation_cytex/</loc>
		<lastmod>2026-01-06T09:46:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/compliance-automation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/qtq80-5iAB87-e1761416665636.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/qtq80-MpcShv-e1761417272790.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/qtq80-HVGbXu-e1761417483201.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/compliance-red.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/audify-pyramiad-1024x929.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/compliance_automation_cytex/audify_cytex/</loc>
		<lastmod>2026-01-06T09:47:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/Audify-Data-Core-Review-Draft-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/audify-pyramiad-reddish.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/ai-security/agentic_ai/</loc>
		<lastmod>2026-01-06T09:48:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/why-agentic-ai.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/alert-triage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/threat-monitoring.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/incident-response.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/offensive-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/cytex_agentic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/AI-security-with-and-without-cytex-1024x551.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/ai-security/</loc>
		<lastmod>2026-01-06T09:49:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/cropped-site-icon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/leo-static-394x394.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/cytex-walkthrough-video-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/09/pie-chart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2024/09/credit-card.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/ai-security/leo/</loc>
		<lastmod>2026-01-06T09:50:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/cropped-leo-static-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/sbom/</loc>
		<lastmod>2026-01-06T10:28:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/alert-triage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/threat-monitoring.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/incident-response.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/offensive-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/Sbom-seamless-integration.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-RFtk3W-e1765280443626.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-jN3jMq.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-zln68S.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/dspm/</loc>
		<lastmod>2026-01-06T10:28:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/cytex-dspm-mindmap-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/threat-monitoring.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/dspm-roi.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-RFtk3W-e1765280443626.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-jN3jMq.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-zln68S.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/soc_automation/</loc>
		<lastmod>2026-01-18T18:59:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/Soc-2-automation-continuous-monitoring-and-compliance.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/single-source-of-truth-unified-dashboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/threat-monitoring.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/soc-integrations-for-audit-readiness-without-heading.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-RFtk3W-e1765280443626.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-jN3jMq.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-zln68S.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/devsecops/</loc>
		<lastmod>2026-02-17T10:32:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/devsecops-security-cycle.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/alert-triage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/threat-monitoring.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/incident-response.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/offensive-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-RFtk3W-e1765280443626.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-jN3jMq.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-zln68S.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/vendor-risk-management/</loc>
		<lastmod>2026-02-17T10:33:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/streamlining-vendor-risk-management-tprm-cytex-1024x551.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/cytex-tprm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/qtq80-A238ps.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/qtq80-zi2syo.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-zln68S.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/security-phishing-gamified-training/</loc>
		<lastmod>2026-02-17T10:33:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/01/Cytex-AI-Powered-Security-Training-and-Phishing-Simulations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/11/threat-monitoring.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-RFtk3W-e1765280443626.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-jN3jMq.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/12/qtq80-zln68S.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/ai-security/aicenturion2_cytex/</loc>
		<lastmod>2026-03-30T22:23:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/03/AICenturion_AIGovernance_Cytex.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/03/human_identity_governance_cytex.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/03/semantinc_access_controls_cytex.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/03/ai_agent_gov_cytex.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/03/unified_control_plane_cytex.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/scalable-ai.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/benefits-of-aicenturion-crimson-red-and-blue.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/qtq80-5iAB87-e1761416665636.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/qtq80-MpcShv-e1761417272790.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/qtq80-HVGbXu-e1761417483201.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/ai-security/aicenturion_cytex/</loc>
		<lastmod>2026-03-30T22:25:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/03/AICenturion_AIGovernance_Cytex.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/03/human_identity_governance_cytex.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/03/semantinc_access_controls_cytex.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/03/ai_agent_gov_cytex.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/03/unified_control_plane_cytex.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/benefits-of-aicenturion-crimson-red-and-blue.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/qtq80-5iAB87-e1761416665636.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/qtq80-MpcShv-e1761417272790.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/10/qtq80-HVGbXu-e1761417483201.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/pricing/</loc>
		<lastmod>2026-04-13T17:46:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/03/Cybersecurity-Risks-Posed-by-Non-Human-Identities-Cytex-Tech-Brief-Thumb.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/03/calude-llm-weaponized-thumb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/about-us/</loc>
		<lastmod>2026-04-13T18:04:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/05/gif-5-optimize.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/05/About-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/05/about-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/contact-us/</loc>
		<lastmod>2026-04-13T18:15:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/03/cropped-site-icon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/plugins/formidable/images/ajax_loader.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cytex.io/resources/</loc>
		<lastmod>2026-04-17T08:26:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2025/09/Comprehensive-AI-Security-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_roguepilot_cyte_techbrief.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_claudellm_clickfix_cytex_techbrief.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_voidlink_ai_generated_malware_cytex_techbrief.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_cyberstrike_ai_fortigate_cytex_techbrief.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_cisco_zeroday_cytex_techbrief.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_gemini_data_expoed_apikeys_cytex_techbrief.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_claude_code_weaponized_cytex_techbrief.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_Arkanix_stealer_ai_malware_cytex_techbrief.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_ai_agents_swarm_cytex_techbrief.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_state_hackers_weaponize_gemini_cytex_techbrief.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_establishing_trust_in_ai_and_ai_agents__cytex_white_papers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_ai_governance_implementation_and_necessity_cytex_white_papers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_cybersecurity_risks_posed_by_nhis_non-human_entities_cytex_white_papers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_solarwinds_supply_chain_attack_cytex_white_papers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/thumb_kronos_ransomware_cytex_white_papers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cytex.io/wp-content/uploads/2026/04/22.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->